US12386998B2 - Method for coupling a medical device with a network - Google Patents
Method for coupling a medical device with a networkInfo
- Publication number
- US12386998B2 US12386998B2 US17/970,622 US202217970622A US12386998B2 US 12386998 B2 US12386998 B2 US 12386998B2 US 202217970622 A US202217970622 A US 202217970622A US 12386998 B2 US12386998 B2 US 12386998B2
- Authority
- US
- United States
- Prior art keywords
- medical device
- network
- verification mode
- connection
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H20/00—ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
- G16H20/10—ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
- G16H20/17—ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients delivered via infusion or injection
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H40/00—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
- G16H40/60—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
- G16H40/67—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
Definitions
- coupling/connecting is usually initially based on the manual exchange of security verification.
- Known standards are based, for example, on verifications such as Simple Certificate Enrollment Protocol (SCEP) or Enrollment over Secure Transport (EST).
- SCEP Simple Certificate Enrollment Protocol
- EST Enrollment over Secure Transport
- the object of the present disclosure is to eliminate or at least reduce the disadvantages of the prior art. Accordingly, one objective of the present disclosure is to solve the following problems:
- the object is solved by a method for establishing a secure and trustworthy communication connection between at least one medical device, in particular at least one infusion pump, and a network.
- a ‘client’ is to be understood as at least one medical device.
- the secure and trustworthy communication connection between at least one medical device and a network is established with a first communication channel and at least one second communication channel out of a plurality of second communication channels, comprising the following steps.
- a connection/coupling request is sent by the at least one medical device to a control unit.
- the at least one medical device is registered in the network via the first communication channel.
- the communication connection is encoded and established via the at least one second communication channel from the plurality of second communication channels, wherein the at least one second communication channel is selected depending on the data type and/or prioritization of data.
- a known ‘access secret’ is exchanged during the installation/connection/coupling of the at least one medical device and of the IT system/network.
- the operator/user starts the coupling/pairing sequence by requesting the coupling/connection via a preferably secured, first communication channel.
- the system sets up dedicated second communication channels for the at least one medical device.
- the system generates certificates and distributes the certificate over the dedicated communication channels.
- the communication channels between the device and the IT system are protected by the generated security certificates.
- Such a coupling process has the advantage that several medical devices can use the same first communication channel already for the registration step and that multiple use of different medical devices is also possible with regard to the second communication channels. In this way, a large number of communication channels can be saved.
- connection/coupling process for a new medical device can be described by the following stages.
- the at least one medical device has to send a pairing/connection/coupling request to the control unit.
- the operator/user has the option to accept or reject the connection request in order for the at least one medical device to join the network.
- the at least one medical device Before the connection/coupling process is initiated, the at least one medical device has to be configured to connect to the network on site.
- the at least one medical device has to be configured with the IT address of a message broker.
- the message broker is understood to be a communication system that can run on multiple, distributed servers that share data traffic among each other and support fail-safe operation.
- information is provided with a time stamp and stored in so-called topics. The stored information is replicated and distributed in the message broker and is available to server applications for further processing.
- the first communication channel is a registration channel and the registration is a one-time method step per medical device, wherein in the method step of the registration, the at least one medical device is configured for the communication connection via a verification step.
- the control unit runs on a server connected to the network.
- control unit specifies a connection mode, which in particular includes an optical verification, a manual verification or a simple connection without verification.
- a first mode is optical verification.
- a mobile terminal device is additionally required to scan a QR code and to read out information contained therein.
- a second mode is manual verification, and a third mode is simple coupling/connecting, where no verification is required and has a reduced trust level. The third mode is only to be used in a secured network environment.
- the at least one medical device shows a key confirmation code encoded in a display and the operator/user can confirm this at the control unit, whereupon the control unit sends further commands.
- control unit confirms the establishment of the communication connection, wherein the communication connection is encoded with a network key and a network key ID.
- the at least one medical device receives the network key and the network key ID and stores them in a persistent memory.
- the at least one medical device enters a connection/coupling mode. This can be done automatically depending on certain criteria or can be initiated manually from a user interface of the at least one medical device.
- the at least one medical device generates its own static EC-key pair and stores it in the persistent local memory.
- a static EC-key pair (an elliptic curve key) is initially generated by the at least one medical device.
- the control unit derives a transient (ephemeral) key pair from this.
- the control unit consumes messages from the first topic and displays a list of the medical devices that have requested a connection/pairing/coupling.
- the operator/user has the choice of accepting or rejecting the request. If the operator accepts the demand/request, the control unit creates a temporary ephemeral EC-key pair.
- the control unit creates the second topic ‘ais. ⁇ client>. ⁇ client_identifier>’ and sets the appropriate access-control levels for the identity of the certificates.
- the control unit forwards the certification signing request for the EC-key pair of the at least one medical device to the internal infrastructure and receives the signed certificate.
- the control unit adds the appropriate access-control levels for the identity of the corresponding certificate to a third topic ‘ais.command. ⁇ client>’.
- the control unit generates a connection/coupling command or a response to the medical device on the second topic using the access secret/the keys for encoding.
- the live load contains the temporary, ephemeral public key of the control unit, the signed certificate of the medical device, and the security certificate.
- the connection/coupling/pairing status field of the live load contains the options for optical verification, manual verification, or simple verification.
- the at least one medical device consumes the command for verification from the second topic.
- the at least one medical device and the control unit can now compute a shared secret ‘z’ for key generation.
- the at least one medical device stores the received, signed certificate and uses it to renew the TLS connection.
- the at least one medical device generates a key confirmation.
- this key confirmation is transmitted with the ‘PAIRING-VERIFIED’ command to the third topic for encoding:
- the control unit changes the access-control levels for the second topic and removes the identity of the corresponding certificate.
- the control unit sends a PAIRING_CONFIRMED order/command to the second topic and uses the secret ‘z’ for encoding.
- the live load contains the network key and the network key ID for further encoding.
- the at least one medical device receives the PAIRING_CONFIRMED command/order and stores the received network key and network key ID in the persistent memory.
- the at least one medical device sends a PAIRING_FINISHED order/command to the third topic and uses the network key for encoding.
- the at least one medical device indicates ‘connection successful’.
- the control unit adds the appropriate access-control levels for the identity from the security certificate to the other common topics.
- the control unit publishes a message to the topic of the fourth topic ‘ais.meta. ⁇ client>’ with the security certificate.
- the at least one medical device connects to the corresponding topics and starts producing data for the network.
- the present disclosure relates to a communication system for providing a secure and trustworthy communication connection between at least one medical device and a network, comprising the at least one medical device, in particular an infusion pump, the network, a control unit which is provided to receive a coupling request of the at least one medical device, a first communication channel configured and provided for registering the at least one medical device in the network, and at least one second communication channel of a plurality of second communication channels configured and provided for encoding the communication connection, wherein at least one of the plurality of second communication channels is selectable depending on data type and/or prioritization of data.
- the communication system is provided and configured to perform and/or carry out the method according to one of the preceding aspects.
- FIG. 1 is a representation illustrating a connection/coupling establishment according to the present disclosure.
- FIG. 2 is a representation illustrating a communication system according to the present disclosure.
- FIG. 1 is a representation illustrating a secure and trustworthy connection/coupling establishment according to the present disclosure.
- a connection/coupling is initiated by at least one medical device 1 via a user 6 or automatically.
- a connection request is sent by the at least one medical device 1 to a control unit 5 according to a second step S2.
- a connection request according to S2 is sent to a topic T1 ‘ais.register. ⁇ client>’ and an access secret/a key is used for encoding.
- the connection request is processed.
- the control unit 5 processes messages from topic T1 and displays a list of medical devices 1 that have requested pairing/connection/coupling according to S2.
- the user 6 can decide to accept or reject the connection request.
- a step S4 the control unit creates a Topic T2 ‘ais. ⁇ client>. ⁇ client_identifier>’, wherein the at least one medical device 1 periodically attempts to subscribe to Topic 2 until it is created.
- the control unit 5 generates a temporary ephemeral EC-key pair and, provided the user 6 has accepted the connection request, the control unit 5 sets the corresponding access-control levels at Topic T2 for the identity of corresponding certificates. Meanwhile, a display of the at least one medical device indicates that the connection/coupling is in progress.
- a fifth step S5 after the connection/coupling is approved/recognized, the control unit 5 generates a coupling command to the at least one medical device 1 of topic T2 using a key/access secret for encoding.
- the at least one medical device 1 is now in a coupling/connection mode and processes a command from topic T2.
- the command from topic 2 indicates the type of verification.
- One of the three commands can be selected: ‘pairing_qrcode’, ‘pairing_code’ or ‘pairing:simple’.
- the at least one medical device 1 and the control unit 5 can now calculate a common secret ‘z’.
- the control unit 5 changes the access-control levels for the topic 2 according to step S8 and removes the corresponding identities of the corresponding certificate.
- the control unit 5 sends a ‘connection confirmed’ command to the topic T2 and uses the secret ‘z’ for encoding.
- a live load that is, the communication data between the at least one medical device 1 and the control unit 5 , has a platform key and a platform key ID for further encoding.
- the at least one medical device 1 receives the command ‘connection confirmed’ and stores the received platform key and platform key ID in a persistent/non-volatile memory.
- a penultimate step S10 the at least one medical device 1 sends a ‘connection completed’ command to the topic T3 and uses the platform key for encoding.
- the at least one medical device 1 indicates ‘connection successful’.
- the control unit 5 adds corresponding access-control levels for the identity of the certificate to a fourth topic T4 ‘ais.meta. ⁇ client>’ and the control unit 5 publishes a message to the topic 4 with the corresponding certificate. Thereupon, the communication connection between the at least one medical device 1 and the network 2 is established.
- FIG. 2 is a representation illustrating a communication system 8 according to the present disclosure.
- four medical devices 1 are shown as examples.
- Each of the medical devices 1 shown can perform the registration step according to S4 to S7 via a first communication channel 3 .
- three second communication channels 4 are shown by way of example in FIG. 2 .
- Each of the medical devices 1 shown is configured and provided to establish an encoded communication channel to a network 2 via at least one of the second communication channels 4 shown.
- the selection of the second communication channel 4 is made by a control unit 5 depending on the data/information to be transmitted.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- Public Health (AREA)
- Primary Health Care (AREA)
- Biomedical Technology (AREA)
- Epidemiology (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Medicinal Chemistry (AREA)
- General Business, Economics & Management (AREA)
- Business, Economics & Management (AREA)
- Chemical & Material Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
-
- Proving the relationship between the digital identity and the physical identity of the at least one medical device;
- Enabling encoding for (asynchronous) messages with unknown recipients;
- Verifying the integrity and authenticity of messages;
- Lockout of unknown/untrusted devices; and
- Immediate revocation of the trust relationship at any time.
-
- the at least one medical device has to be configured to connect to the network,
- the at least one medical device has to know the address of the message broker, wherein preferably the use of a predefined dns entry is to be used as fallback,
- the at least one medical device has to know the access secret/the key (hospital access secret),
- optionally, the at least one medical device may have a trustworthy root certificate (CertCA).
-
- a live load (data to be transmitted) contains a certification signing request for the EC-key pair of the at least one medical device;
- the live load contains information of the at least one medical device for display at the control unit;
- identifier, device type, family, serial number, firmware version, etc.; and
- the live load connection status field issues a connection request.
-
- a. In case of simple coupling/connecting, the at least one medical device sends the order/command (PAIRING_SIMPLE) of the verification type itself
- b. In the case of manual coupling/connecting, the at least one medical device shows the key confirmation code in code on the display, and the operator/user can confirm on the control unit that the confirmation is correct. The control unit then sends the command (PAIRING_CODE).
- c. In the case of optical coupling/connecting, the at least one medical device shows the key confirmation code as a QR code on the display, and the operator/user can send it to the control unit with a mobile terminal device via a second secure communication channel, whereby the control unit sends the command.
- The control unit checks whether the key confirmation code is identical.
Claims (15)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102021127478.8A DE102021127478A1 (en) | 2021-10-22 | 2021-10-22 | Method of pairing a medical device to a network |
| DE102021127478.8 | 2021-10-22 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20230131795A1 US20230131795A1 (en) | 2023-04-27 |
| US12386998B2 true US12386998B2 (en) | 2025-08-12 |
Family
ID=83903254
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/970,622 Active 2043-04-06 US12386998B2 (en) | 2021-10-22 | 2022-10-21 | Method for coupling a medical device with a network |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US12386998B2 (en) |
| EP (1) | EP4170969B1 (en) |
| CN (1) | CN116015705A (en) |
| DE (1) | DE102021127478A1 (en) |
| PL (1) | PL4170969T3 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP4651433A1 (en) * | 2024-05-14 | 2025-11-19 | Roche Diabetes Care GmbH | A method and system for medical device identity and access management |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7859400B2 (en) * | 2006-05-30 | 2010-12-28 | Biotronik Crm Patent Ag | Method and apparatus for automatic registration of a patient-bound medical unit |
| US20130322348A1 (en) * | 2012-05-31 | 2013-12-05 | Qualcomm Incorporated | Channel switching scheme for wireless communication |
| US20170325091A1 (en) * | 2016-03-30 | 2017-11-09 | Zoll Medical Corporation | Establishing Secure Communication at an Emergency Care Scene |
| US20200023127A1 (en) | 2002-01-29 | 2020-01-23 | Baxter International Inc. | Management of infusion data methods and apparatus |
| US20200287937A1 (en) | 2019-03-06 | 2020-09-10 | Carefusion 303, Inc. | Automatic network provisioning of a medical device |
| US20200358769A1 (en) * | 2019-05-06 | 2020-11-12 | Apple Inc. | Authenticating and creating accounts on behalf of another user |
| US20210050999A1 (en) * | 2019-08-27 | 2021-02-18 | Po-Kai Huang | Enhanced security for multi-link wireless operations |
| US20210083884A1 (en) * | 2013-03-15 | 2021-03-18 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US10955662B2 (en) * | 2017-05-22 | 2021-03-23 | Magic Leap, Inc. | Pairing with companion device |
-
2021
- 2021-10-22 DE DE102021127478.8A patent/DE102021127478A1/en active Pending
-
2022
- 2022-10-20 EP EP22202784.9A patent/EP4170969B1/en active Active
- 2022-10-20 PL PL22202784.9T patent/PL4170969T3/en unknown
- 2022-10-21 CN CN202211292763.9A patent/CN116015705A/en active Pending
- 2022-10-21 US US17/970,622 patent/US12386998B2/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20200023127A1 (en) | 2002-01-29 | 2020-01-23 | Baxter International Inc. | Management of infusion data methods and apparatus |
| US7859400B2 (en) * | 2006-05-30 | 2010-12-28 | Biotronik Crm Patent Ag | Method and apparatus for automatic registration of a patient-bound medical unit |
| US20130322348A1 (en) * | 2012-05-31 | 2013-12-05 | Qualcomm Incorporated | Channel switching scheme for wireless communication |
| US20210083884A1 (en) * | 2013-03-15 | 2021-03-18 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US20170325091A1 (en) * | 2016-03-30 | 2017-11-09 | Zoll Medical Corporation | Establishing Secure Communication at an Emergency Care Scene |
| US10955662B2 (en) * | 2017-05-22 | 2021-03-23 | Magic Leap, Inc. | Pairing with companion device |
| US20200287937A1 (en) | 2019-03-06 | 2020-09-10 | Carefusion 303, Inc. | Automatic network provisioning of a medical device |
| US20200358769A1 (en) * | 2019-05-06 | 2020-11-12 | Apple Inc. | Authenticating and creating accounts on behalf of another user |
| US20210050999A1 (en) * | 2019-08-27 | 2021-02-18 | Po-Kai Huang | Enhanced security for multi-link wireless operations |
Non-Patent Citations (2)
| Title |
|---|
| Search Report received in European Application No. 22 202 784.9 dated Mar. 2, 2023, with translation, 15 pages. |
| Search Report received in German Application No. 10 2021 127 478.8 dated Jun. 22, 2022, with translation, 12 pages. |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4170969B1 (en) | 2024-09-18 |
| CN116015705A (en) | 2023-04-25 |
| PL4170969T3 (en) | 2025-01-20 |
| EP4170969A1 (en) | 2023-04-26 |
| US20230131795A1 (en) | 2023-04-27 |
| DE102021127478A1 (en) | 2023-04-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2705642B1 (en) | System and method for providing access credentials | |
| US8515066B2 (en) | Method, apparatus and program for establishing encrypted communication channel between apparatuses | |
| CN1615632B (en) | Method, apparatus and system for supporting server-side authentication for wired and wireless clients | |
| US8892869B2 (en) | Network device authentication | |
| US20220217152A1 (en) | Systems and methods for network access granting | |
| US20090240941A1 (en) | Method and apparatus for authenticating device in multi domain home network environment | |
| US11252572B2 (en) | Network application function registration | |
| CN109428875A (en) | Service-based architecture-based discovery method and device | |
| CN116783866A (en) | Method, system and computer-readable medium for automated key management of 5G Core (5GC) authorized Network Function (NF) Repository Function (NRF) access token public keys to mitigate security attacks | |
| CN108028829A (en) | For obtaining the method being initially accessed and relevant wireless device and network node to network | |
| US7225261B2 (en) | Service provision method, relay device, and service provision apparatus | |
| US12386998B2 (en) | Method for coupling a medical device with a network | |
| CN107172052B (en) | Authentication method and device for conference system | |
| EP4170968A1 (en) | Method for coupling a medical device to a network | |
| JP4619059B2 (en) | Terminal device, firewall device, method for firewall device control, and program | |
| US12483892B2 (en) | Methods, systems, and computer readable media for authentication between network function repository functions across different networks | |
| CN114978747B (en) | Registration authentication method, registration authentication device, electronic equipment and storage medium | |
| US20100313240A1 (en) | Authentication system and method between server and client | |
| US11985172B2 (en) | Communication network and method of decentralised management of communications via the communication network | |
| CN116405487B (en) | A file sharing method based on password | |
| US20260046147A1 (en) | Communication method and apparatus | |
| US8627505B2 (en) | Technique for controlling access by a client entity to a service | |
| CN119234405A (en) | Configuration of terminal equipment in a radio communication network | |
| CN119449338A (en) | Method and device for calling service API | |
| EP1460816A1 (en) | Multichannel communication system and method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: B. BRAUN MELSUNGEN AG, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SCHMOLL, HORST;DUESTERHUS, MICHAEL;SIGNING DATES FROM 20221025 TO 20221027;REEL/FRAME:061849/0399 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |